705
Views
0
CrossRef citations to date
0
Altmetric
Articles

China’s use of rhetorical adaptation in development of a global cyber order: a case study of the norm of the protection of the public core of the internet

Pages 256-274 | Received 30 Jun 2022, Accepted 27 Dec 2022, Published online: 22 Mar 2023
 

ABSTRACT

How does China shape a global information order, regarding the norms and institutions that manage cyberspace? Cyber norms are the preferred tool to govern cyberspace given the rapidity of technological change. China’s advances ‘cyber sovereignty’ (wangluo zhuquan) norms to reorient internet governance to the United Nations and specialist state-led international fora and emphasise the dominant position of the state regarding information management. The paper uses a critical case study of a foundational cyber norm: the protection of the public core of the internet, which focuses on ‘safeguarding the functionality and integrity of the core logical and physical infrastructure of the internet from unwarranted state interventions’ (Broeders 2017a). Using descriptive research drawing from primary and secondary sources in Chinese and English languages, I highlight China’s use of rhetorical adaptation – a strategy and set of tactics that simultaneously modify norm content while also deflecting and reducing critiques of norm obstructionism to modify cyber norms. China’s use of rhetorical adaptation renovates norm content by centring the state as the public core of the internet that must be protected – in short internet infrastructure security is in service to state security.

Acknowledgements

My thanks go to Sara Plana and Fabio Cristiano who commented on earlier versions of the manuscript prepared for the 2022 International Studies Association Annual Meeting and the 2021 Hague Program for Cyber Norms Conference, respectively. I thank Patryk Pawlak and Agnese Olmati for the opportunity to explore additional ideas in my November 2022 blog post on ‘How China Promotes Cyber Sovereignty’ on the EU Institute for Security Studies’ Directions blog. Finally, I am indebted to the five reviewers who gave concise criticism and recommendations to improve my work.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 I assume issue-specific orders versus a singular ‘liberal international order’ or ‘rules-based international order’ (Foot and Waler Citation2011; Johnston Citation2019).

2 For a refutation of the internet as a global commons, see Raymond (Citation2013).

3 Hungary, Iran, Poland, Russia, Saudi Arabia and Thailand all use cyber sovereignty discourse, for example.

4 First-wave norm literature assumed that norms were fixed in content and meaning, exported for recipients to assume wholesale as a means of socialization (Finnemore and Sikkink Citation1998). Second-wave norm literature noted the domestic and regional legal barriers, for example, to explain the variation in norm uptake through institutionalization (Checkel Citation1999). Third-wave norm literature addresses ‘localization,’ explaining how international-level norms, vectored to the local-level are grafted on to existing local normative orders during institutionalization (Acharya Citation2004).

5 The full definition of cyber sovereignty is as follows: ‘As a basic norm in contemporary international relations, the principle of sovereignty enshrined in the UN Charter covers all aspects of state-to-state relations, which also includes cyberspace. Countries should respect each other’s right to choose their own path of cyber development, model of cyber regulation and Internet public policies, and participate in international cyberspace governance on an equal footing. No country should pursue cyber hegemony, interfere in other countries’ internal affairs or engage in, condone or support cyber activities that undermine other countries’ national security. Upholding sovereignty in cyberspace not only reflects governments’ responsibility and right to administer cyberspace in accordance with law, but also enables countries to build platforms for sound interactions among governments, businesses and social groups. This will foster a healthy environment for the advancement of information technology and international exchange and cooperation. National governments are entitled to administer cyberspace in accordance with law. They exercise jurisdiction over ICT infrastructure, resources and activities within their territories, and are entitled to protect their ICT systems and resources from threat, disruption, attack and destruction so as to safeguard citizens’ legitimate rights and interests in cyberspace. National governments are entitled to enact public policies, laws and regulations with no foreign interference. Countries should exercise their rights based on the principle of sovereign equality and also perform their due duties. No country should use ICT to interfere in other countries’ internal affairs or leverage its advantage to undermine the security of other countries’ ICT product and service supply chain.’ (2017 International Strategy on Cooperation in Cyberspace).

6 The 2014 Wuzhen Internet Conference slogan.

7 For example, PRC proposals in the Open-Ended Working Group include that states should be supported to draft ‘ICT-related public policies consistent with national circumstances’ and that ‘states should refrain from using ICTs to interfere in internal affairs of other states and undermine their political, economic and social stability.’ See Open-Ended Working Group (Citation2021).

8 The complications of including the organization infrastructure (e.g. Internet Exchanges, CERTs) are discussed in Broeders (Citation2017a, Citation2017b).

9 After land, sea, air, and space.

10 I thank the editor for prompting this point.

11 Buzan (Citation2016) uses the term ‘autistic rising powers’.’ See Christian Citation2017 critique of ‘ableism’ in International Relations.

12 See Russian Federation (Citation2021a, Citation2021b).

Additional information

Notes on contributors

Courtney J. Fung

Courtney J. Fung is Associate Professor in the Department of Security Studies and Criminology, Macquarie University. Her research focuses on how rising powers address the norms and provisions for global governance and international security, with an empirical focus on China. She is the author of China and Intervention at the UN Security Council: Reconciling Status (Oxford: Oxford University Press, 2019). Her research is published in peer-reviewed journals like The China Quarterly, Cooperation and Conflict, Global Governance, International Affairs, International Relations of the Asia-Pacific, International Peacekeeping, Journal of Global Security Studies, amongst others.

Log in via your institution

Log in to Taylor & Francis Online

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 288.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.